QUESTION 71An organization has recently deployed ISE with the latest models of Cisco switches, and it plans to deploy Trustsec to secure its infrastructure. The company also wants to allow different network access policies for different user groups (e.g., administrators). Which solution is needed to achieve these goals?

A. Cisco Security Group Access Policies in order to use SGACLs to control access based on SGTs assigned to different usersB. MACsec in Multiple-Host Mode in order to open or close a portbased on a single authenticationC. Identity-based ACLs on the switches with user identities provided by ISED. Cisco Threat Defense for user group control by leveraging Netflow exported from the switches and login information from ISE

Answer: A

QUESTION 72Security Group Access requires which three syslog messages to be sent to Cisco ISE? (Choose three.)

QUESTION 73Which Cisco IOS IPS feature allows to you remove one or more actions from all active signatures based on the attacker and/or target address criteria, as well as the event risk rating criteria?

A. configures VLANs 100 and 200 and associates them as a communityB. associates VLANs 100 and 200 with the primary VLANC. creates two private VLANs with the designation of VLAN 100 and VLAN 200D. assigns VLANs 100 and 200 as an association of private VLANs

Answer: B

QUESTION 75Which of these allows you to add event actions globally based on the risk rating of each event,without having to configure each signature individually?

QUESTION 77What is the result of configuring the command dotlx system-auth-control on a Cisco Catalyst switch?

A. enables the switch to operate as the 802.1X supplicantB. globally enables 802.1X on the switchC. globally enables 802.1X and defines ports as 802.1X-capableD. places the configuration sub-mode into dotix-auth mode, in which you can identify the authentication server parameters

QUESTION 79When enabling the Cisco IOS IPS feature, which step should you perform to prevent rogue signature updates from being installed on the router?

A. configure authentication and authorization for maintaining signature updatesB. install a known RSA public key that correlates to a private key used by CiscoC. manually import signature updates from Cisco to a secure server, and then transfer files from the secure server to the routerD. use the SDEE protocol for all signature updates from a known secure management station

Answer: B

QUESTION 80When is it most appropriate to choose IPS functionality based on Cisco IOS software?

A. when traffic rates are low and a complete signature is not requiredB. when accelerated, integrated performance is required using hardware ASIC-based IPS inspectionsC. when integrated policy virtualization is requiredD. when promiscuous inspection meets security requirements